uTorrent causing BSOD - Windows 7 64bit


  1. Posts : 2
    Windows 7 Home Premium 64bit
       #1

    uTorrent causing BSOD - Windows 7 64bit


    Hi

    This only started happening recently. Basically as soon as uTorrent has finished checking the integrity of a torrent my computer will bluescreen.

    Any help would be appreciated.
      My Computer


  2. Posts : 28,845
    Win 8 Release candidate 8400
       #2

    Bulkhead said:
    Hi

    This only started happening recently. Basically as soon as uTorrent has finished checking the integrity of a torrent my computer will bluescreen.

    Any help would be appreciated.

    All of these were identical and blaimed on netio.sys. Usually when this is blamed it is because of Zone Alarm. If so remove it and use the win 7 firewall instead. Might also want to use Microsoft Security Essentials instead as well


    http://download.zonealarm.com/bin/fr...cpes_clean.exe

    Information: [Prework] Please Read Before Posting - PC Help Forum

    Code:
    Microsoft (R) Windows Debugger Version 6.11.0001.404 X86
    Copyright (c) Microsoft Corporation. All rights reserved.
    
    
    Loading Dump File [C:\Users\K\Desktop\Windows_NT6_BSOD_jcgriff2\042311-21949-01.dmp]
    Mini Kernel Dump File: Only registers and stack trace are available
    
    Symbol search path is: SRV*C:\Symbols*http://msdl.microsoft.com/download/symbols;srv*e:\symbols
    *http://msdl.microsoft.com/download/symbols
    Executable search path is: 
    Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
    Product: WinNt, suite: TerminalServer SingleUserTS Personal
    Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
    Machine Name:
    Kernel base = 0xfffff800`02e68000 PsLoadedModuleList = 0xfffff800`030ade90
    Debug session time: Sat Apr 23 08:24:24.056 2011 (GMT-4)
    System Uptime: 1 days 1:16:24.570
    Loading Kernel Symbols
    ...............................................................
    ................................................................
    ..............................
    Loading User Symbols
    Loading unloaded module list
    ..............
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    Use !analyze -v to get detailed debugging information.
    
    BugCheck D1, {28, 2, 0, fffff880019a8b2d}
    
    Probably caused by : NETIO.SYS ( NETIO!RtlCopyBufferToMdl+1d )
    
    Followup: MachineOwner
    ---------
    
    0: kd> !analyze -v
    *******************************************************************************
    *                                                                             *
    *                        Bugcheck Analysis                                    *
    *                                                                             *
    *******************************************************************************
    
    DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
    An attempt was made to access a pageable (or completely invalid) address at an
    interrupt request level (IRQL) that is too high.  This is usually
    caused by drivers using improper addresses.
    If kernel debugger is available get stack backtrace.
    Arguments:
    Arg1: 0000000000000028, memory referenced
    Arg2: 0000000000000002, IRQL
    Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
    Arg4: fffff880019a8b2d, address which referenced memory
    
    Debugging Details:
    ------------------
    
    
    READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800031190e8
     0000000000000028 
    
    CURRENT_IRQL:  2
    
    FAULTING_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`019a8b2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    CUSTOMER_CRASH_COUNT:  1
    
    DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT
    
    BUGCHECK_STR:  0xD1
    
    PROCESS_NAME:  System
    
    TRAP_FRAME:  fffff880035c3620 -- (.trap 0xfffff880035c3620)
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880035c3840 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880019a8b2d rsp=fffff880035c37b0 rbp=fffff880035c38e0
     r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000000000
    r11=fffffa800a3f78f0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    NETIO!RtlCopyBufferToMdl+0x1d:
    fffff880`019a8b2d 448b5228        mov     r10d,dword ptr [rdx+28h] ds:0010:00000000`00000028=????????
    Resetting default scope
    
    LAST_CONTROL_TRANSFER:  from fffff80002ee7be9 to fffff80002ee8640
    
    STACK_TEXT:  
    fffff880`035c34d8 fffff800`02ee7be9 : 00000000`0000000a 00000000`00000028 00000000`00000002 00000000`00000000 : nt!KeBugCheckEx
    fffff880`035c34e0 fffff800`02ee6860 : fffffa80`08c53cf0 fffff880`01acbdd2 fffffa80`05bd1800 00000000`00000044 : nt!KiBugCheckDispatch+0x69
    fffff880`035c3620 fffff880`019a8b2d : ffff0000`02e0c686 00000000`00000001 00000000`00000000 00000000`00000000 : nt!KiPageFault+0x260
    fffff880`035c37b0 fffff880`01b0f5ec : 00000000`00000000 fffff880`01ade376 00000000`00000001 00000000`00000000 : NETIO!RtlCopyBufferToMdl+0x1d
    fffff880`035c3810 fffff880`01adb963 : fffffa80`0a3f78f0 00000000`00000001 fffffa80`0a1fb4b0 00000000`00000000 : tcpip! ?? ::FNODOBFM::`string'+0x1d6ef
    fffff880`035c3880 fffff880`01ac9d54 : fffffa80`05f11010 00000000`000067fb fffff880`035c3d78 fffffa80`06ad3000 : tcpip!TcpTcbCarefulDatagram+0x543
    fffff880`035c3a30 fffff880`01ac85ea : fffffa80`06af0400 fffff880`01ac0a00 fffffa80`06984088 00000000`00000000 : tcpip!TcpTcbReceive+0x724
    fffff880`035c3c20 fffff880`01aca2ab : fffffa80`091e8e5c fffffa80`06ad3000 00000000`00000000 fffff880`035c3f00 : tcpip!TcpMatchReceive+0x1fa
    fffff880`035c3d70 fffff880`01ac1137 : fffffa80`06af0400 fffffa80`069c67fb fffffa80`0000e1d3 00000000`0000e1d3 : tcpip!TcpPreValidatedReceive+0x36b
    fffff880`035c3e40 fffff880`01ac0caa : 00000000`00000000 fffff880`01bd0800 fffff880`035c4000 00000000`0000000a : tcpip!IppDeliverListToProtocol+0x97
    fffff880`035c3f00 fffff880`01ac02a9 : 00000000`00000000 fffffa80`09062800 00000000`00000000 fffff880`035c3ff0 : tcpip!IppProcessDeliverList+0x5a
    fffff880`035c3fa0 fffff880`01abdfff : 00000000`00000000 00000000`08f6cb00 fffff880`01bd0800 fffff880`01bd0800 : tcpip!IppReceiveHeaderBatch+0x23a
    fffff880`035c4080 fffff880`01abd5f2 : fffffa80`08f708b0 00000000`00000000 fffffa80`08f6cb00 fffff880`00000001 : tcpip!IpFlcReceivePackets+0x64f
    fffff880`035c4280 fffff880`01b3175a : fffff880`01bd59a0 00000000`00000018 fffffa80`08f6cba0 fffffa80`08f7314c : tcpip!FlpReceiveNonPreValidatedNetBufferListChain+0x2b2
    fffff880`035c4360 fffff800`02ef5078 : fffff880`676e7049 00000000`00000004 fffffa80`05a6e040 00000000`00000001 : tcpip! ?? ::FNODOBFM::`string'+0x56e52
    fffff880`035c43b0 fffff880`01abd152 : fffff880`01abc9b0 fffffa80`09920190 fffff880`035c4800 fffffa80`069b8c01 : nt!KeExpandKernelStackAndCalloutEx+0xd8
    fffff880`035c4490 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : tcpip!FlReceiveNetBufferListChain+0xb2
    
    
    STACK_COMMAND:  kb
    
    FOLLOWUP_IP: 
    NETIO!RtlCopyBufferToMdl+1d
    fffff880`019a8b2d 448b5228        mov     r10d,dword ptr [rdx+28h]
    
    SYMBOL_STACK_INDEX:  3
    
    SYMBOL_NAME:  NETIO!RtlCopyBufferToMdl+1d
    
    FOLLOWUP_NAME:  MachineOwner
    
    MODULE_NAME: NETIO
    
    IMAGE_NAME:  NETIO.SYS
    
    DEBUG_FLR_IMAGE_TIMESTAMP:  4ce79381
    
    FAILURE_BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    BUCKET_ID:  X64_0xD1_NETIO!RtlCopyBufferToMdl+1d
    
    Followup: MachineOwner
    ---------
    
    0: kd> .trap 0xfffff880035c3620
    NOTE: The trap frame does not contain all registers.
    Some register values may be zeroed or incorrect.
    rax=fffff880035c3840 rbx=0000000000000000 rcx=0000000000000000
    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
    rip=fffff880019a8b2d rsp=fffff880035c37b0 rbp=fffff880035c38e0
     r8=00000000ffffffbc  r9=0000000000000044 r10=0000000000000000
    r11=fffffa800a3f78f0 r12=0000000000000000 r13=0000000000000000
    r14=0000000000000000 r15=0000000000000000
    iopl=0         nv up ei pl zr na po nc
    NETIO!RtlCopyBufferToMdl+0x1d:
    fffff880`019a8b2d 448b5228        mov     r10d,dword ptr [rdx+28h] ds:0010:00000000`00000028=????????
      My Computer


  3. Posts : 2
    Windows 7 Home Premium 64bit
    Thread Starter
       #3

    That seems to have fixed it.

    Thanks for the help.
      My Computer


  4. Posts : 28,845
    Win 8 Release candidate 8400
       #4

    Bulkhead said:
    That seems to have fixed it.

    Thanks for the help.

    My Pleasure
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 09:50.
Find Us